咨询与建议

限定检索结果

文献类型

  • 1,742 篇 期刊文献
  • 1,514 篇 会议
  • 1 册 图书

馆藏范围

  • 3,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,128 篇 工学
    • 1,048 篇 计算机科学与技术...
    • 820 篇 软件工程
    • 427 篇 信息与通信工程
    • 376 篇 电子科学与技术(可...
    • 349 篇 电气工程
    • 256 篇 控制科学与工程
    • 169 篇 化学工程与技术
    • 158 篇 机械工程
    • 146 篇 材料科学与工程(可...
    • 142 篇 仪器科学与技术
    • 125 篇 生物工程
    • 124 篇 光学工程
    • 120 篇 网络空间安全
    • 108 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 63 篇 安全科学与工程
    • 57 篇 建筑学
    • 55 篇 生物医学工程(可授...
  • 1,273 篇 理学
    • 488 篇 数学
    • 472 篇 物理学
    • 163 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 147 篇 大气科学
    • 142 篇 化学
    • 92 篇 系统科学
  • 400 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 82 篇 法学
  • 77 篇 医学
    • 55 篇 临床医学
  • 57 篇 农学
  • 54 篇 军事学
  • 38 篇 经济学
  • 7 篇 艺术学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 39 篇 training
  • 35 篇 optimization
  • 35 篇 computational mo...
  • 33 篇 quantum cryptogr...
  • 32 篇 protocols
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 26 篇 machine learning
  • 24 篇 data mining
  • 23 篇 predictive model...

机构

  • 174 篇 state key labora...
  • 150 篇 national key lab...
  • 113 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 69 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 32 篇 shandong provinc...
  • 31 篇 science and tech...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 32 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 30 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 26 篇 ai bo
  • 24 篇 wang wei
  • 23 篇 zhao jinjing
  • 22 篇 li yang
  • 19 篇 xiaochun cao
  • 19 篇 xiu-bo chen
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xiaohui kuang
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 18 篇 gang xu
  • 17 篇 qing wang
  • 17 篇 li jin
  • 17 篇 yang yang

语言

  • 2,992 篇 英文
  • 153 篇 中文
  • 109 篇 其他
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3257 条 记 录,以下是3141-3150 订阅
排序:
Geospatial information semantic retrieval algorithm Research based on geo-ontology
Geospatial Information semantic retrieval algorithm Research...
收藏 引用
International Conference on Geoinformatics
作者: Wei Liu Yunyan Du Hairong Zhang Rulin Xiao State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources Research Chinese Academy and Sciences Beijing China School of Environment Science and Spatial Informatics China University of Mining and Technology Xuzhou Jiangsu China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources Chinese Academy and Sciences Beijing China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources Research Chinese Academy and Sciences Beijing China
Spatial information retrieval which is mainly catalog service based on metadata is the foundation of spatial information sharing. Today's information retrieval methods in catalog service are typically limited to k... 详细信息
来源: 评论
Routing Protocol for Wireless Sensor Networks in Home Automation
收藏 引用
IFAC Proceedings Volumes 2009年 第3期42卷 27-33页
作者: Xiao Hui Li Hong Qin Xu Seung Ho Hong Zhi Wang Xiang Fan Piao Engineering Research Center of Metallurgical Automation and Measurement Technology Ministry of Education Wuhan University of Science and Technology Wuhan Hubei 430081 China State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou 310027 China Department of Electronics Information and System Engineering Hanyang University 425-791 Korea Department of Electronic Information Engineering College of Science and Engineering Yanbian University Yanji 133002 China
Home automation systems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the loc... 详细信息
来源: 评论
The ATPG Conflict-Driven Scheme for High Transition Fault Coverage and Low Test Cost
The ATPG Conflict-Driven Scheme for High Transition Fault Co...
收藏 引用
IEEE VLSI Test Symposium (VTS)
作者: Zhen Chen Dong Xiang Boxue Yin Department of Computer Science and Technology Tsinghua University School of software Key Laboratory for Information System Security Ministry of Education Tsinghua National Laboratory for Information Science and Technology Tsinghua University
This paper presents two new conflict-driven techniques for improving transition fault coverage using multiple scan chains. These techniques are based on a novel test application scheme, in order to break the functiona... 详细信息
来源: 评论
Fast KD-tree construction method by probing the optimal splitting plane heuristically
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第2期32卷 185-192页
作者: Fan, Wen-Shan Wang, Bin Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
In the field of ray-tracing based photo-realistic rendering, kd-tree is used as an important acceleration structure. This paper focuses on the effective construction of kd-tree, and proposes a novel and fast construct... 详细信息
来源: 评论
Space charge characteristics of multi-layer oil-paper insulation under different DC voltages
Space charge characteristics of multi-layer oil-paper insula...
收藏 引用
第九届电介质材料性能与应用国际会议(The 9th International Conference on Properties and Applications of Dielectric Materials)
作者: Chao TANG G CHEN M FU Ruijin LIAO The State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongq School of Electronics and Computer Science University of Southampton UK AVERA T&D Technology Centre Stafford UK The State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongq
In this paper, space charge in oil-paper insulation system has been investigated using the pulsed electroacoustic (PEA) technique. A series of measurements were carried out when the insulation system was subjected to ... 详细信息
来源: 评论
Network security situational awareness model based on information fusion
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2009年 第3期46卷 353-362页
作者: Wei, Yong Lian, Yifeng Feng, Dengguo Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
security situational awareness has become a hot topic in the area of network security research in recent years, which attracts the interest of more and more domestic and foreign researchers. The existing security situ... 详细信息
来源: 评论
Network security situational awareness model based on log audit and performance correction
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第4期32卷 763-772页
作者: Wei, Yong Lian, Yi-Feng Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm. First, nodes theoretic s... 详细信息
来源: 评论
Fuzzy analytic hierarchy process-based utilities evaluation and adoption for DRM security policies
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 126-131页
作者: Zhang, Zhi-Yong Ye, Chuan-Qi Fan, Ke-Feng Zhang, Li-Li Niu, Dan-Mei Electronics Information Engineering College Henan University of Science and Technology Luoyang 471003 China Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China Information Security Center for the State Key Laboratory of Network and Exchange Beijing Post and Telecom University Beijing 100158 China
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&... 详细信息
来源: 评论
A Provable Secure ID-Based Explicit Authenticated key Agreement Protocol Without Random Oracles
收藏 引用
Journal of Computer science & technology 2008年 第5期23卷 832-842页
作者: 田海博 Willy Susilo 明洋 王育民 School of Information Science and Technology Sun Yat-Sen University Guangdong Key Laboratory of Information Security Technology Centre for Computer and Information Security Research (CCISR) School of Computer Science and Software Engineering University of Wollongong School of Information Engineering Chang'an University State Key Laboratory on ISN Xidian University
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmatio... 详细信息
来源: 评论
Multi-proxy quantum group signature scheme with threshold shared verification
收藏 引用
Chinese Physics B 2008年 第2期17卷 415-418页
作者: 杨宇光 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy... 详细信息
来源: 评论